Talos recently released and advisory for ISCB-BIND TALOS-2020-1100 - Internet Systems Consortium's BIND TCP Receive Buffer Length Assertion Check Denial of Service Vulnerability CVE-2020-8620 where an unauth DOS is described.
An assertion failure exists within the Internet Systems Consortium’s BIND server versions 9.16.1 through 9.17.1 when processing TCP traffic via the libuv library. Due to a length specified within a callback for the library, flooding the server’s TCP port used for larger DNS requests (AXFR) can cause the libuv library to pass a length to the server which will violate an assertion check in the server’s verifications. This assertion check will terminate the service resulting in a denial of service condition. An attacker can flood the port with unauthenticated packets in order to trigger this vulnerability.
2 interesting things here:
- version 9.16-9.17
- Port 53/TCP
from all the ISC-Bind versions in use online, that answered on Port 53/tcp (2.3 mio total) we could identify 13.000 as version 9.16/9.17 (0.8%), while 14% (340.000 installations) dont show versions-info; see an according table and chart below.
Fragen? Kontakt: email@example.com